{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:48:58Z","timestamp":1775422138673,"version":"3.50.1"},"reference-count":209,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3097247","type":"journal-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T22:28:11Z","timestamp":1627338491000},"page":"101574-101599","source":"Crossref","is-referenced-by-count":242,"title":["Deep Learning-Based Intrusion Detection Systems: A Systematic Review"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2485-1494","authenticated-orcid":false,"given":"Jan","family":"Lansky","sequence":"first","affiliation":[{"name":"Department of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, Prague, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7905-7306","authenticated-orcid":false,"given":"Saqib","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Muscat, Oman"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1393-5062","authenticated-orcid":false,"given":"Mokhtar","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Engineering and Computer Science, Lebanese French University, Erbil, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8894-5479","authenticated-orcid":false,"given":"Mohammed Kamal","family":"Majeed","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Tishk International University, Erbil, Iraq"}]},{"given":"Sarkhel H. Taher","family":"Karim","sequence":"additional","affiliation":[{"name":"Computer Department, College of Science, University of Halabja, Halabja, Iraq"}]},{"given":"Shima","family":"Rashidi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Human Development, Sulaymaniyah, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3040-1801","authenticated-orcid":false,"given":"Mehdi","family":"Hosseinzadeh","sequence":"additional","affiliation":[{"name":"Pattern Recognition and Machine Learning Lab, Gachon University, Seongnamdaero, Sujeonggu, Seongnam, Republic of Korea"}]},{"given":"Amir Masoud","family":"Rahmani","sequence":"additional","affiliation":[{"name":"Future Technology Research Center, National Yunlin University of Science and Technology, Yunlin, Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1539"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0736-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1642"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960617"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.06.018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03010-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103278"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-112"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101701"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03264-w"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03184-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1187-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1506-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0644-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-020-09332-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4524"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00866-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00320-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.030"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.06.014"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04557-3"},{"key":"ref37","volume-title":"McAfee Labs Threat\n                        Report","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.10.006"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/EBBT.2019.8742081"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2019070104"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.07.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1253"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3285029"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000179"},{"key":"ref54","article-title":"Shallow and deep networks intrusion detection system:\n                        A taxonomy and survey","author":"Hodo","year":"2017","journal-title":"arXiv:1701.02145"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.025"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2018.8436774"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905633"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560674"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628685"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625278"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1328-8_14"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701969"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06158-6_10"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2385-7"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101974"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3078292"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.043"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546162"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893871"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00563-4_74"},{"key":"ref74","article-title":"Kitsune: An ensemble of autoencoders for online\n                        network intrusion detection","author":"Mirsky","year":"2018","journal-title":"arXiv:1802.09089"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769473"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00508-5"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2019.8925239"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064215"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107044"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2021.3077946"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06011-9"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5564354"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869577"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2018.8472418"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323688"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67422-3_13"},{"key":"ref88","article-title":"A deep learning based DDoS detection system in\n                        software-defined networking (SDN)","author":"Niyaz","year":"2016","journal-title":"arXiv:1611.07400"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233561"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966339"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106460"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04152-6"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2414-z"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT.2019.8935927"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1994-9"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2901792"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923814"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.026"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2017.8230287"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59153-7_38"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CISCE.2019.00102"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01611-9"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064338"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01694-4"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994947"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51971-1_24"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.3390\/pr9050834"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2021.112980"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03169-x"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3053304"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903723"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3176653.3176717"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/app9020238"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/s19091977"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"ref123","article-title":"Deep learning for unsupervised insider threat\n                        detection in structured cybersecurity data streams","author":"Tuor","year":"2017","journal-title":"arXiv:1710.00811"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0248-6"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013302"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182099"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073413"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107039"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106997"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.08.004"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04187-9"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599759"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8668995"},{"key":"ref143","first-page":"1084","article-title":"A prototype to detect anomalies using machine\n                        learning algorithms and deep neural network","volume-title":"Computational Vision and Bio Inspired Computing","author":"Malathi","year":"2018"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8090968"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/IPACT.2017.8245184"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170757"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591322"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2017.7881684"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280825"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69811-3_44"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.56801\/rebicte.v3i.54"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2019.8784514"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16946-6_63"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3582-2_2"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05918-7_20"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908225"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394474"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06158-6_9"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.069"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/NICS48868.2019.9023871"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986882"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05017-0"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.042"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106798"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01623-2"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8891185"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4705982"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43306-2_3"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071151"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322395"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS49938.2020.9237656"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108117"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074664"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.03.060"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100338"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3050917"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC50856.2021.9390930"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/3430984.3431036"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904620"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8488987"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref193","article-title":"eXpose: A character-level convolutional neural\n                        network with embeddings for detecting malicious URLs, file paths and\n                        registry keys","author":"Saxe","year":"2017","journal-title":"arXiv:1702.08568"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802785"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00060"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2019.8795319"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59650-1_52"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1142\/S1469026820500169"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05017-0"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034621"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.3390\/s19112528"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110343"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421359"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09483916.pdf?arnumber=9483916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:23:48Z","timestamp":1732735428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9483916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":209,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3097247","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}